AI Buyer Insights:

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Michelin, an e2open customer evaluated Oracle Transportation Management

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Michelin, an e2open customer evaluated Oracle Transportation Management

List of Trellix Threat Intelligence Exchange Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Arab National Bank Banking and Financial Services 4206 $2.3B Saudi Arabia Trellix Trellix Threat Intelligence Exchange Threat Modeling 2023 n/a
In 2023 Arab National Bank implemented Trellix Threat Intelligence Exchange as part of a Threat Modeling initiative to consolidate SecOps tooling across its Saudi Arabia banking operations. The deployment was positioned within the IT SecOps process area to centralize threat intelligence and support protection of customer data across retail and corporate banking functions. The implementation configured Trellix Threat Intelligence Exchange as a centralized threat intelligence hub providing indicator correlation, enrichment, and automated prioritization to support investigations. Functionality implemented included intelligence ingestion and sharing, case orchestration and investigation workflows, and integration points for alert consolidation consistent with Threat Modeling practices. Trellix Threat Intelligence Exchange was deployed alongside endpoint protection, network forensics, and data loss prevention systems, creating integrated telemetry flows between endpoint, network, and DLP signals. Operational coverage focused on SecOps teams in Saudi Arabia, enabling consolidated alerting and a unified investigation queue for incident responders. Governance changes emphasized centralized triage and standardized investigation playbooks to reduce duplication of effort and training time. Per the Trellix customer story the consolidated Trellix deployment improved visibility, streamlined investigations, and reduced operational overhead and training time while supporting continued protection of customer data.
Cyberuptive Professional Services 10 $1M United States Trellix Trellix Threat Intelligence Exchange Threat Modeling 2024 n/a
In 2024 Cyberuptive implemented Trellix Threat Intelligence Exchange to support Threat Modeling for its US-based security operations center. The deployment focused on embedding Trellix Threat Intelligence Exchange into SecOps workflows to enable automated investigations and managed detection and response services for clients in the United States. The implementation configured the Trellix Threat Intelligence Exchange module to provide threat enrichment, indicator correlation, and automated case generation, aligning with common Threat Modeling capabilities for real-time threat context and prioritization. Automation of investigative playbooks and alert triage pipelines was a core functional area, enabling the SOC to shift from manual enrichment to orchestrated response workflows. Trellix Threat Intelligence Exchange was integrated with Trellix XDR and Helix as the primary telemetry and orchestration layers, creating a connected data and alerting architecture within Cyberuptive's SOC. Operational coverage was explicitly SecOps and MSSP delivery in the United States, with the integrated stack supporting ongoing managed detection and response operations and cross-tool alert sharing between XDR, Helix, and the threat intelligence exchange. Governance changes emphasized SOC playbook standardization and incident handling workflows to operationalize automated investigations and MDR delivery. Reported outcomes from the case study include reduced response times and increased incident resolution efficiency as a result of the Trellix Threat Intelligence Exchange integration.
Sms Group Manufacturing 14544 $2.7B Germany Trellix Trellix Threat Intelligence Exchange Threat Modeling 2023 n/a
In 2023 SMS Group deployed Trellix Threat Intelligence Exchange as a Threat Modeling solution to support a broader Trellix XDR SecOps implementation aimed at strengthening IT/SecOps and OT security across its manufacturing operations in Germany. The implementation centered on centralized threat intelligence ingestion and operationalization to provide a single pane of visibility for cross-functional security teams. Trellix Threat Intelligence Exchange was configured to aggregate indicators, enrich telemetry, and drive automated policy enforcement, with automation used to reduce manual triage and streamline analyst workflows. The deployment leveraged policy automation to accelerate indicator actions and operationalize threat scoring and correlation consistent with Threat Modeling functional patterns. Operational integration included centralized management through Trellix ePO and Helix, aligning Threat Intelligence Exchange with the vendor XDR stack for coordinated detection and response across IT and OT environments. The rollout focused on SecOps and OT security teams in Germany, consolidating alert handling and response orchestration under a unified control plane. Governance changes emphasized standardized playbooks and automated policy pipelines, enabling consistent incident handling and policy propagation via the Trellix management layer. According to the vendor case study the deployment reduced mean time to respond, saved analyst time through automated policies, and centralized management via Trellix ePO and Helix.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating Trellix Threat Intelligence Exchange

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Trellix Threat Intelligence Exchange. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Trellix Threat Intelligence Exchange Coverage

Trellix Threat Intelligence Exchange is a Threat Modeling solution from Trellix.

Companies worldwide use Trellix Threat Intelligence Exchange, from small firms to large enterprises across 21+ industries.

Organizations such as Sms Group, Arab National Bank and Cyberuptive are recorded users of Trellix Threat Intelligence Exchange for Threat Modeling.

Companies using Trellix Threat Intelligence Exchange are most concentrated in Manufacturing, Banking and Financial Services and Professional Services, with adoption spanning over 21 industries.

Companies using Trellix Threat Intelligence Exchange are most concentrated in Germany, Saudi Arabia and United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Trellix Threat Intelligence Exchange across Americas, EMEA, and APAC.

Companies using Trellix Threat Intelligence Exchange range from small businesses with 0-100 employees - 33.33%, to mid-sized firms with 101-1,000 employees - 0%, large organizations with 1,001-10,000 employees - 33.33%, and global enterprises with 10,000+ employees - 33.33%.

Customers of Trellix Threat Intelligence Exchange include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Trellix Threat Intelligence Exchange customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Threat Modeling.